NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 526 to 540 of 1,593 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C.; Wen, Bo – Journal of Education for Business, 2017
With the increasing demand for cybersecurity professionals, the authors examined how business schools are meeting that demand, specifically the core requirements of their cybersecurity curricula related to information systems programs. They examined 518 Association to Advance Collegiate Schools of Business-accredited business schools in the United…
Descriptors: Business Schools, Computer Security, College Curriculum, Undergraduate Study
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gupta, Deepty; Surbhi – Journal of Educational Technology, 2018
Information and Communication Technology (ICT) has provided the better learning opportunities to the present teachers and learners across the world. In the era of internet, many educational resources are free and lot of free softwares are also available. In our country the basic operating system used in educational institutions are proprietary in…
Descriptors: Open Source Technology, Computer Software, Barriers, Online Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eckerly, Carol; Smith, Russell; Sowles, John – Practical Assessment, Research & Evaluation, 2018
The Discrete Option Multiple Choice (DOMC) item format was introduced by Foster and Miller (2009) with the intent of improving the security of test content. However, by changing the amount and order of the content presented, the test taking experience varies by test taker, thereby introducing potential fairness issues. In this paper we…
Descriptors: Culture Fair Tests, Multiple Choice Tests, Testing, Test Items
Harrison, Brynne – ProQuest LLC, 2018
Phishing has become a preferred method among cyber criminals looking to gain access to confidential information. Although most businesses and governmental organizations provide employees with some sort of cyber security training, there is a lack of research examining whether such training methods work to actually reduce susceptibility to…
Descriptors: Training Methods, Information Security, Computer Security, Money Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ruenphongphun, Prarichart; Sukkamart, Aukkapong; Pimdee, Paitoon – World Journal on Educational Technology: Current Issues, 2021
From the study's initial qualitative analysis, 10 latent variables and 22 indicators concerning digital citizenship skills (DCS) were used in a questionnaire on a sample of 506 Thai Business Computer Programme undergraduate students attending one of six regional Thai Rajabhat Universities. Goodness-of-fit and descriptive statistical analysis…
Descriptors: Undergraduate Students, Citizenship Education, Business Administration Education, Student Attitudes
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Adrian Curaj; Cezar Hâj; Cosmin Holeab; Irina Geanta; Alina Iura; Dorin Cote?; Oana ?în?ar – European Union, 2025
The present report overseen by the Executive Agency for Higher Education, Research, Development and Innovation Funding (UEFISCDI) on behalf of the European Commission and the European Education and Culture Executive Agency as part of the contract for the implementation of the European Digital Education Hub, is the third report in a series…
Descriptors: Foreign Countries, Educational Innovation, Electronic Learning, Educational Practices
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sharma, Vipin K.; Holbah, Wael A. – Arab World English Journal, 2022
The study investigates teachers' perceptions of the use of online language assessment (OLA) using technology and examines the scope of using online applications to validate the mode of assessment. It looks for EFL teachers' opinions of OLA to comprehend the many worries associated with the issues and improve the online assessment tools. The…
Descriptors: Language Teachers, Teacher Attitudes, English (Second Language), Second Language Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Liesen, Joseph J. – ProQuest LLC, 2017
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
Descriptors: Qualitative Research, Case Studies, Barriers, Small Colleges
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
Schools (public and nonpublic) and school districts face a myriad of challenging hazards and threats. In addition to natural hazards, technological hazards, and biological hazards, they now have to prepare for human-caused cyber threats. These incidents can be accidental or deliberate and disrupt education and critical operations; expose sensitive…
Descriptors: Computer Security, Information Security, Elementary Schools, Secondary Schools
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
The ability to securely connect to virtual systems is an important element within a safe and supportive learning environment. This is particularly the case within institutions of higher education (IHEs), where students are increasingly learning in digital formats; faculty, staff, and visitors are constantly accessing and sharing information…
Descriptors: Computer Security, Information Security, Higher Education, Universities
Armstead, Stanley K. – ProQuest LLC, 2017
In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…
Descriptors: Military Personnel, Foreign Countries, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gallego-Arrufat, María-Jesús; Torres-Hernández, Norma; Pessoa, Teresa – Comunicar: Media Education Research Journal, 2019
The use of technologies and the Internet poses problems and risks related to digital security. This article presents the results of a study on the evaluation of the digital competence of future teachers in the DigCompEdu European framework. 317 undergraduate students from Spain and Portugal answered a questionnaire with 59 items, validated by…
Descriptors: Teacher Competencies, Educational Technology, Technology Uses in Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Braiko, Bohdan – Comparative Professional Pedagogy, 2019
The article deals with the relevant problem of updating the system of graduate training (master's degree) in Ukraine. It analyzes the ways of Ukraine's integration into the European Higher Education Area and the legal framework of higher education in Ukraine and the UK. It also presents a comparative pedagogical analysis of the features of…
Descriptors: Comparative Education, Information Security, Computer Security, Masters Programs
Pages: 1  |  ...  |  32  |  33  |  34  |  35  |  36  |  37  |  38  |  39  |  40  |  ...  |  107